Insights on Cryptography, Quantum Readiness, and Security Strategy
Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.
Tags:
Quantum Computing is Creating Driverless - More Hackable - Cars
Of the top disruptive technologies that will benefit from quantum computing, self-driving cars look most imminent as a commercial prospect. Google Street View cars have made the concept familiar. Demonstrations of new models that will transform how people travel are becoming more frequent. Companies…
How Quantum Computing Increases Cybersecurity Risks
The following is an excerpt from a contributed opinion piece on CSO by Scott Totzke, CEO & Co-Founder of ISARA Corporation. Imagine you wake up one morning, assuming everything is as you left it the night before. But overnight, attackers with a quantum computer capable of breaking current cryptography…
Your Blockchain Might be Dead - and Alive - on Arrival
The following is an excerpt from a contributed opinion piece on ITSP Magazine by Scott Totzke, CEO & Co-Founder of ISARA Corporation. The financial world is abuzz with talk of blockchain, and for good reason. Blockchain is the technology upon which the Bitcoin digital currency is built. It has the…
From Research to Action
Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.
Every Environment Is Different
If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.